Show filters
158 Total Results
Displaying 61-70 of 158
Sort by:
Attacker Value
Unknown
CVE-2020-25677
Disclosure Date: December 08, 2020 (last updated February 22, 2025)
A flaw was found in Ceph-ansible v4.0.41 where it creates an /etc/ceph/iscsi-gateway.conf with insecure default permissions. This flaw allows any user on the system to read sensitive information within this file. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2020-2310
Disclosure Date: November 04, 2020 (last updated October 26, 2023)
Missing permission checks in Jenkins Ansible Plugin 1.0 and earlier allow attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
0
Attacker Value
Unknown
CVE-2020-25635
Disclosure Date: October 05, 2020 (last updated February 22, 2025)
A flaw was found in Ansible Base when using the aws_ssm connection plugin as garbage collector is not happening after playbook run is completed. Files would remain in the bucket exposing the data. This issue affects directly data confidentiality.
0
Attacker Value
Unknown
CVE-2020-25636
Disclosure Date: October 05, 2020 (last updated February 22, 2025)
A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.
0
Attacker Value
Unknown
CVE-2020-14365
Disclosure Date: September 23, 2020 (last updated February 22, 2025)
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when disable_gpg_check is set to False, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.
0
Attacker Value
Unknown
CVE-2020-14332
Disclosure Date: September 11, 2020 (last updated February 22, 2025)
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.
0
Attacker Value
Unknown
CVE-2020-14330
Disclosure Date: September 11, 2020 (last updated February 22, 2025)
An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2019-14904
Disclosure Date: August 26, 2020 (last updated February 22, 2025)
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
0
Attacker Value
Unknown
CVE-2020-14337
Disclosure Date: July 31, 2020 (last updated February 21, 2025)
A data exposure flaw was found in Tower, where sensitive data was revealed from the HTTP return error codes. This flaw allows an unauthenticated, remote attacker to retrieve pages from the default organization and verify existing usernames. The highest threat from this vulnerability is to data confidentiality.
0
Attacker Value
Unknown
CVE-2020-10782
Disclosure Date: June 18, 2020 (last updated February 21, 2025)
An exposure of sensitive information flaw was found in Ansible version 3.7.0. Sensitive information, such tokens and other secrets could be readable and exposed from the rsyslog configuration file, which has set the wrong world-readable permissions. The highest threat from this vulnerability is to confidentiality. This is fixed in Ansible version 3.7.1.
0